The researcher [1-10] proposed a method for computing the numerical solution to quasi-linear parabolic p.d.e.s using a Chebyshev method. The purpose of this paper is to extend the method to problems with mixed boundary conditions. An error analysis for the linear problem is given and a global element Chebyshev method is described. A comparison of various chebyshev methods is made by applying them to two-point eigenproblems. It is shown by analysis and numerical examples that the approach used to derive the generalized Chebyshev method is comparable, in terms of the accuracy obtained, with existing Chebyshev methods.
The current research aims to identify the level of digital skills of kindergarten teachers, identify the level of professional competence of kindergarten teachers, as well as to identify the relationship between digital skills and the professional competence of kindergarten teachers. The current research was determined by kindergarten teachers in the second Baghdad / Karkh Education Directorate for the academic year (2021-2022). The research sample consisted of (100) teachers chosen in a simple random way. To achieve the objectives of the research, the researcher developed a digital skills scale of (20) items and a scale of professional competence consisting of (22) items. The results revealed that kindergarten teachers have a high level
... Show MoreThis study develops a systematic density functional theory alongside on-site Coulomb interaction correction (DFT + U) and ab initio atomistic thermodynamics approachs for ternary (or mixed transitional metal oxides), expressed in three reservoirs. As a case study, among notable multiple metal oxides, synthesized CoCu2O3 exhibits favourable properties towards applications in solar, thermal and catalytic processes. This progressive contribution applies DFT + U and atomistic thermodynamic approaches to examine the structure and relative stability of CoCu2O3 surfaces. Twenty-five surfaces along the [001], [010], [100], [011], [101], [110] and [111] low-Miller-indices, with varying surface-termination configurations were selected in this study.
... Show MoreA novel series of mixed-ligand complexes of the type, [ML1(L2)3]Clx [M= Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiff base (HL1) as main ligand, nicotinamide (L2) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR,1H-NMR,13C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiff base ligand, HL1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxygen atoms, whereas the sec
... Show MoreCalcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively. The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreMany numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.
The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.